Galois recently completed its work on DARPA’s Securing Information for Encrypted Verification and Evaluation (SIEVE) program, which sought to “advance the state of the art in Zero Knowledge Proofs (ZKPs) to enable complex, DoD-relevant applications.” Over the course of working on SIEVE, our research pushed ZKP performance forward significantly, making the task—once considered far too […]
Read More
Nuclear power plants in the United States are part of what the Department of Homeland Security identifies as “nationally critical infrastructure,” a category that also includes our vast transportation network, water systems, electrical grids, and more. For decades, even as other parts of the nation’s infrastructure began using computers, American nuclear power plants avoided integrating […]
Read More
In 2003, just as the invasion of Iraq was heating up, the U.S. Army reached out to the University of Minnesota’s Center for Distributed Robotics (CDR). They needed compact robots capable of providing real-time reconnaissance and situational awareness for troops on the ground. The CDR, the army knew, was already engaged in developing advanced remote-controlled […]
Read More
For more than two decades, the Need for Speed (NFS) video game franchise captured the hearts of young gamers across the globe with its high-octane thrills, heart-pounding car chases, and the adrenaline rush of illegal street racing. Yet for many, especially those who played the earliest iterations in the late ‘90s and early 2000s, NFS […]
Read More
In March, 2024, researchers discovered a backdoor hidden in an update of open-source Linux tool XZ Utils – a vulnerability that appears likely to be the result of a multi-year, state-sponsored supply chain attack. This latest close call is only the most recent in a growing history of incidents underscoring the fragility of a modern […]
Read More
In May 2016, the newly created Decentralized Autonomous Organization (DAO), an investor-directed venture capital fund built as a smart contract on the Ethereum blockchain, raised around $150 million worth of digital currency. Hopes were high. The fund was to be a fully transparent and decentralized organization, with investment decisions made collectively through member votes, and […]
Read More
In the world of cybersecurity, proving software vulnerabilities responsibly is a critical challenge. Imagine a security analyst discovers a vulnerability and wants to tell a software company that their program can be hacked. Here, they face a common dilemma: when they tell the software company about the vulnerability, the company may choose to simply ignore […]
Read More
The US Department of Education (DOE) was in a quandary. Every few years, they were required to report to Congress on the state of undergraduate student financial aid in the United States, but the confidential data needed to create the report was divided between two different internal offices—offices forbidden by policy to share data with […]
Read More
The arcane world of cryptographic proofs seldom finds expression on the dashboard of your average automobile, but a partnership between Galois and Cybernetica is steering the state of the art in privacy-preserving technology towards the road less traveled—in Estonia, to be precise. In 2020, Estonia’s Environmental Investment Centre introduced a public program to encourage the […]
Read More
Growing up, Taisa Kushner loved math. There was a functional elegance to the way mathematical techniques could be used to unravel even the most complex problems, and how seemingly disparate systems were linked through simple equations. But she enjoyed the biological sciences too, and wanted to find a career where she could use her skills […]
Read More